Attack Phase: Execute, Implant, Retract. Flashcards
1
Q
General notes:
A
- This is the phase where you execute the attack itself
- Installing backdoors is crucial for retaining access to a device
- You must be able to exit a target device and system without leaving a single trace that could make the owner or administrator aware of your presence.
- If you do, they’ll most likely track the breach and patch up ever vulnerability that you’ve exploited up to that point, and all the progress you’ve made will be made entirely irrelevant (except for the progress you’ve made in terms of information acquisition, and if the system has any other notable vulnerabilities that you’re aware of and that you haven’t already made use of, that’s at least a bit of a head start into making your way back into the system. Anywho. Bad idea, be careful, don’t get noticed, you don’t want to lose anything that you’ve gained up to this point).
- DELETE ALL LOG FILES PERTAINING TO YOUR EXISTENCE I SWEAR TO GOD DON’T BE DOING NO DUMBS YOU SIMPLISTIC WHORE
- Find which anti-virus systems they you so that you can be sure that you won’t be detected with a random scan
- ## Don’t attempt to install anything on the target machine that you haven’t already installed on a custom virtual machine of your own making with the same security mechanisms.